forked from wolfSSL/wolfssl
fix possible null dereference, CID 518681
This commit is contained in:
@ -1112,7 +1112,7 @@ static int ProcessBufferTryDecode(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
|
|||||||
matchAnyKey = 1;
|
matchAnyKey = 1;
|
||||||
}
|
}
|
||||||
#ifdef WC_RSA_PSS
|
#ifdef WC_RSA_PSS
|
||||||
if(*keyFormat == RSAPSSk) {
|
if((ret == 0) && (*keyFormat == RSAPSSk)) {
|
||||||
/*
|
/*
|
||||||
Require logic to verify that the der is RSAPSSk (when *keyFormat == RSAPSSK),
|
Require logic to verify that the der is RSAPSSk (when *keyFormat == RSAPSSK),
|
||||||
and to detect that the der is RSAPSSk (when *keyFormat == 0).
|
and to detect that the der is RSAPSSk (when *keyFormat == 0).
|
||||||
|
Reference in New Issue
Block a user